General

  • Target

    2024-02-18_dca6b3d7e8ea835994181b59a8b6bbc1_cryptolocker

  • Size

    97KB

  • MD5

    dca6b3d7e8ea835994181b59a8b6bbc1

  • SHA1

    6d99a92c768b572e390f8c1bf2a414fed282e4fa

  • SHA256

    6b1a5e43ee9c97878b918889fd15ceaa33e17e096df58ddaaded9445cbdda160

  • SHA512

    47e34c8e1d161f98db2bbb327428d84e739f3f0366420ab2fe61672463d380a8ef7e1234aad75196b6cd7098416bc6094b8b3b6659b1622ee6c70502fda72093

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKES:z6a+CdOOtEvwDpjcu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_dca6b3d7e8ea835994181b59a8b6bbc1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections